34,840 results on '"Yang, Yong"'
Search Results
2. Navigating the Risks: A Survey of Security, Privacy, and Ethics Threats in LLM-Based Agents
- Author
-
Gan, Yuyou, Yang, Yong, Ma, Zhe, He, Ping, Zeng, Rui, Wang, Yiming, Li, Qingming, Zhou, Chunyi, Li, Songze, Wang, Ting, Gao, Yunjun, Wu, Yingcai, and Ji, Shouling
- Subjects
Computer Science - Artificial Intelligence - Abstract
With the continuous development of large language models (LLMs), transformer-based models have made groundbreaking advances in numerous natural language processing (NLP) tasks, leading to the emergence of a series of agents that use LLMs as their control hub. While LLMs have achieved success in various tasks, they face numerous security and privacy threats, which become even more severe in the agent scenarios. To enhance the reliability of LLM-based applications, a range of research has emerged to assess and mitigate these risks from different perspectives. To help researchers gain a comprehensive understanding of various risks, this survey collects and analyzes the different threats faced by these agents. To address the challenges posed by previous taxonomies in handling cross-module and cross-stage threats, we propose a novel taxonomy framework based on the sources and impacts. Additionally, we identify six key features of LLM-based agents, based on which we summarize the current research progress and analyze their limitations. Subsequently, we select four representative agents as case studies to analyze the risks they may face in practical use. Finally, based on the aforementioned analyses, we propose future research directions from the perspectives of data, methodology, and policy, respectively.
- Published
- 2024
3. DarkSHINE Baseline Design Report: Physics Prospects and Detector Technologies
- Author
-
Chen, Jing, Chen, Ji-Yuan, Chen, Jun-Feng, Chen, Xiang, Fu, Chang-Bo, Guo, Jun, Guo, Yi-Han, Khaw, Kim Siang, Li, Jia-Lin, Li, Liang, Li, Shu, Lin, Yu-ming, Liu, Dan-Ning, Liu, Kang, Liu, Kun, Liu, Qi-Bin, Liu, Zhi, Lu, Ze-Jia, Lv, Meng, Song, Si-Yuan, Sun, Tong, Tang, Jian-Nan, Wan, Wei-Shi, Wang, Dong, Wang, Xiao-Long, Wang, Yu-Feng, Wang, Zhen, Wang, Zi-Rui, Wu, Wei-Hao, Yang, Hai-Jun, Yang, Lin, Yang, Yong, Yu, Dian, Yuan, Rui, Zhang, Jun-Hua, Zhang, Yu-Lei, Zhang, Yun-Long, Zhao, Zhi-Yu, Zhou, Bai-Hong, Zhu, Chun-Xiang, Zhu, Xu-Liang, and Zhu, Yi-Fan
- Subjects
Physics - Instrumentation and Detectors ,High Energy Physics - Experiment - Abstract
DarkSHINE is a newly proposed fixed-target experiment initiative to search for the invisible decay of Dark Photon via missing energy/momentum signatures, based on the high repetition rate electron beam to be deployed/delivered by the Shanghai High repetition rate XFEL and Extreme light facility (SHINE). This report elaborates the baseline design of DarkSHINE experiment by introducing the physics goals, experimental setups, details of each sub-detector system technical designs, signal and backgground modelings, expected search sensitivities and future prospects, which mark an important step towards the further prototyping and technical demonstrations.
- Published
- 2024
4. $S^5$: New insights from deep spectroscopic observations of the tidal tails of the globular clusters NGC 1261 and NGC 1904
- Author
-
Awad, Petra, Li, Ting S., Erkal, Denis, Peletier, Reynier F., Bunte, Kerstin, Koposov, Sergey E., Li, Andrew, Balbinot, Eduardo, Smith, Rory, Canducci, Marco, Tino, Peter, Senkevich, Alexandra M., Cullinane, Lara R., Da Costa, Gary S., Ji, Alexander P., Kuehn, Kyler, Lewis, Geraint F., Pace, Andrew B., Zucker, Daniel B., Bland-Hawthorn, Joss, Limberg, Guilherme, Martell, Sarah L., McKenzie, Madeleine, Yang, Yong, and Usman, Sam A.
- Subjects
Astrophysics - Astrophysics of Galaxies - Abstract
As globular clusters (GCs) orbit the Milky Way, their stars are tidally stripped forming tidal tails that follow the orbit of the clusters around the Galaxy. The morphology of these tails is complex and shows correlations with the phase of the orbit and the orbital angular velocity, especially for GCs on eccentric orbits. Here, we focus on two GCs, NGC 1261 and NGC 1904, that have potentially been accreted alongside Gaia-Enceladus and that have shown signatures of having, in addition of tidal tails, structures formed by distributions of extra-tidal stars that are misaligned with the general direction of the clusters' respective orbits. To provide an explanation for the formation of these structures, we make use of spectroscopic measurements from the Southern Stellar Stream Spectroscopic Survey ($S^5$) as well as proper motion measurements from Gaia's third data release (DR3), and apply a Bayesian mixture modeling approach to isolate high-probability member stars. We recover extra-tidal features similar to those found in Shipp et al. (2018) surrounding each cluster. We conduct N-body simulations and compare the expected distribution and variation in the dynamical parameters along the orbit with those of our potential member sample. Furthermore, we use Dark Energy Camera (DECam) photometry to inspect the distribution of the member stars in the color-magnitude diagram (CMD). We find that the potential members agree reasonably with the N-body simulations and that the majority of them follow a simple stellar population-like distribution in the CMD which is characteristic of GCs. In the case of NGC 1904, we clearly detect the tidal debris escaping the inner and outer Lagrange points which are expected to be prominent when at or close to the apocenter of its orbit. Our analysis allows for further exploration of other GCs in the Milky Way that exhibit similar extra-tidal features.
- Published
- 2024
5. Tuning the Quasi-bound States of Double-barrier Structures: Insights from Resonant Tunneling Spectra
- Author
-
Li, Wei and Yang, Yong
- Subjects
Condensed Matter - Mesoscale and Nanoscale Physics - Abstract
In this work, we study the resonant tunneling (RT) of electrons and H atoms in double-barrier (DB) systems. Our numerical calculations directly verify the correspondence between the resonant tunneling energies and the energy levels of quasi-bound states (QBS) within the double barriers. Based on this, in-depth analyses are carried out on the modulation of QBS energy levels and numbers which show step variation with the inter-barrier spacing. The mathematical criterion for the existence of QBS is derived, and the impacts of the barrier width and barrier height on QBS levels are investigated. Taking the rectangular double-barrier as an example, we have studied the manipulation of electronic structures and optical properties of the inter-barrier region (quasi-potential well) by tuning the inter-barrier spacing (width of quasi-potential well). Atom-like optical absorption features are found in the range of infrared to visible spectrum, which can be continuously tuned by the variation of quasi-potential well width. The potential application of double-barrier nanostructures in ultrahigh-precision detection of electromagnetic radiations is demonstrated.
- Published
- 2024
6. Tencent Hunyuan3D-1.0: A Unified Framework for Text-to-3D and Image-to-3D Generation
- Author
-
Yang, Xianghui, Shi, Huiwen, Zhang, Bowen, Yang, Fan, Wang, Jiacheng, Zhao, Hongxu, Liu, Xinhai, Wang, Xinzhou, Lin, Qingxiang, Yu, Jiaao, Wang, Lifu, Chen, Zhuo, Liu, Sicong, Liu, Yuhong, Yang, Yong, Wang, Di, Jiang, Jie, and Guo, Chunchao
- Subjects
Computer Science - Computer Vision and Pattern Recognition ,Computer Science - Artificial Intelligence - Abstract
While 3D generative models have greatly improved artists' workflows, the existing diffusion models for 3D generation suffer from slow generation and poor generalization. To address this issue, we propose a two-stage approach named Hunyuan3D-1.0 including a lite version and a standard version, that both support text- and image-conditioned generation. In the first stage, we employ a multi-view diffusion model that efficiently generates multi-view RGB in approximately 4 seconds. These multi-view images capture rich details of the 3D asset from different viewpoints, relaxing the tasks from single-view to multi-view reconstruction. In the second stage, we introduce a feed-forward reconstruction model that rapidly and faithfully reconstructs the 3D asset given the generated multi-view images in approximately 7 seconds. The reconstruction network learns to handle noises and in-consistency introduced by the multi-view diffusion and leverages the available information from the condition image to efficiently recover the 3D structure. Our framework involves the text-to-image model, i.e., Hunyuan-DiT, making it a unified framework to support both text- and image-conditioned 3D generation. Our standard version has 3x more parameters than our lite and other existing model. Our Hunyuan3D-1.0 achieves an impressive balance between speed and quality, significantly reducing generation time while maintaining the quality and diversity of the produced assets., Comment: Technical Report; 3D Generation
- Published
- 2024
7. Hunyuan-Large: An Open-Source MoE Model with 52 Billion Activated Parameters by Tencent
- Author
-
Sun, Xingwu, Chen, Yanfeng, Huang, Yiqing, Xie, Ruobing, Zhu, Jiaqi, Zhang, Kai, Li, Shuaipeng, Yang, Zhen, Han, Jonny, Shu, Xiaobo, Bu, Jiahao, Chen, Zhongzhi, Huang, Xuemeng, Lian, Fengzong, Yang, Saiyong, Yan, Jianfeng, Zeng, Yuyuan, Ren, Xiaoqin, Yu, Chao, Wu, Lulu, Mao, Yue, Xia, Jun, Yang, Tao, Zheng, Suncong, Wu, Kan, Jiao, Dian, Xue, Jinbao, Zhang, Xipeng, Wu, Decheng, Liu, Kai, Wu, Dengpeng, Xu, Guanghui, Chen, Shaohua, Chen, Shuang, Feng, Xiao, Hong, Yigeng, Zheng, Junqiang, Xu, Chengcheng, Li, Zongwei, Kuang, Xiong, Hu, Jianglu, Chen, Yiqi, Deng, Yuchi, Li, Guiyang, Liu, Ao, Zhang, Chenchen, Hu, Shihui, Zhao, Zilong, Wu, Zifan, Ding, Yao, Wang, Weichao, Liu, Han, Wang, Roberts, Fei, Hao, Yu, Peijie, Zhao, Ze, Cao, Xun, Wang, Hai, Xiang, Fusheng, Huang, Mengyuan, Xiong, Zhiyuan, Hu, Bin, Hou, Xuebin, Jiang, Lei, Ma, Jianqiang, Wu, Jiajia, Deng, Yaping, Shen, Yi, Wang, Qian, Liu, Weijie, Liu, Jie, Chen, Meng, Dong, Liang, Jia, Weiwen, Chen, Hu, Liu, Feifei, Yuan, Rui, Xu, Huilin, Yan, Zhenxiang, Cao, Tengfei, Hu, Zhichao, Feng, Xinhua, Du, Dong, Yu, Tinghao, Tao, Yangyu, Zhang, Feng, Zhu, Jianchen, Xu, Chengzhong, Li, Xirui, Zha, Chong, Ouyang, Wen, Xia, Yinben, Li, Xiang, He, Zekun, Chen, Rongpeng, Song, Jiawei, Chen, Ruibin, Jiang, Fan, Zhao, Chongqing, Wang, Bo, Gong, Hao, Gan, Rong, Hu, Winston, Kang, Zhanhui, Yang, Yong, Liu, Yuhong, Wang, Di, and Jiang, Jie
- Subjects
Computer Science - Computation and Language ,Computer Science - Artificial Intelligence - Abstract
In this paper, we introduce Hunyuan-Large, which is currently the largest open-source Transformer-based mixture of experts model, with a total of 389 billion parameters and 52 billion activation parameters, capable of handling up to 256K tokens. We conduct a thorough evaluation of Hunyuan-Large's superior performance across various benchmarks including language understanding and generation, logical reasoning, mathematical problem-solving, coding, long-context, and aggregated tasks, where it outperforms LLama3.1-70B and exhibits comparable performance when compared to the significantly larger LLama3.1-405B model. Key practice of Hunyuan-Large include large-scale synthetic data that is orders larger than in previous literature, a mixed expert routing strategy, a key-value cache compression technique, and an expert-specific learning rate strategy. Additionally, we also investigate the scaling laws and learning rate schedule of mixture of experts models, providing valuable insights and guidances for future model development and optimization. The code and checkpoints of Hunyuan-Large are released to facilitate future innovations and applications. Codes: https://github.com/Tencent/Hunyuan-Large Models: https://huggingface.co/tencent/Tencent-Hunyuan-Large, Comment: 17 pages, 4 Figures
- Published
- 2024
8. Ground calibration and network of the first CATCH pathfinder
- Author
-
Huang, Yiming, Xiao, Jingyu, Tao, Lian, Zhang, Shuang-Nan, Yin, Qian-Qing, Wang, Yusa, Zhao, Zijian, Zhang, Chen, Zhao, Qingchang, Ma, Xiang, Zhao, Shujie, Zhou, Heng, Wen, Xiangyang, Li, Zhengwei, Xiong, Shaolin, Zhang, Juan, Bu, Qingcui, Cang, Jirong, Cao, Dezhi, Chen, Wen, Ding, Siran, Dai, Yanfeng, Gao, Min, Gao, Yang, He, Huilin, Hou, Shujin, Hou, Dongjie, Hu, Tai, Huang, Guoli, Huang, Yue, Jia, Liping, Jin, Ge, Li, Dalin, Li, Jinsong, Li, Panping, Li, Yajun, Liu, Xiaojing, Ma, Ruican, Men, Lingling, Pan, Xingyu, Qi, Liqiang, Song, Liming, Sun, Xianfei, Tang, Qingwen, Xiong, Liyuan, Xu, Yibo, Yang, Sheng, Yang, Yanji, Yang, Yong, Zhang, Aimei, Zhang, Wei, Zhang, Yifan, Zhang, Yueting, Zhao, Donghua, Zhao, Kang, and Zhu, Yuxuan
- Subjects
Astrophysics - Instrumentation and Methods for Astrophysics - Abstract
The Chasing All Transients Constellation Hunters (CATCH) space mission is focused on exploring the dynamic universe via X-ray follow-up observations of various transients. The first pathfinder of the CATCH mission, CATCH-1, was launched on June 22, 2024, alongside the Space-based multiband astronomical Variable Objects Monitor (SVOM) mission. CATCH-1 is equipped with narrow-field optimized Micro Pore Optics (MPOs) featuring a large effective area and incorporates four Silicon Drift Detectors (SDDs) in its focal plane. This paper presents the system calibration results conducted before the satellite integration. Utilizing the data on the performance of the mirror and detectors obtained through the system calibration, combined with simulated data, the ground calibration database can be established. Measuring the relative positions of the mirror and detector system, which were adjusted during system calibration, allows for accurate installation of the entire satellite. Furthermore, the paper outlines the operational workflow of the ground network post-satellite launch.
- Published
- 2024
9. Denial-of-Service Poisoning Attacks against Large Language Models
- Author
-
Gao, Kuofeng, Pang, Tianyu, Du, Chao, Yang, Yong, Xia, Shu-Tao, and Lin, Min
- Subjects
Computer Science - Cryptography and Security ,Computer Science - Computation and Language - Abstract
Recent studies have shown that LLMs are vulnerable to denial-of-service (DoS) attacks, where adversarial inputs like spelling errors or non-semantic prompts trigger endless outputs without generating an [EOS] token. These attacks can potentially cause high latency and make LLM services inaccessible to other users or tasks. However, when there are speech-to-text interfaces (e.g., voice commands to a robot), executing such DoS attacks becomes challenging, as it is difficult to introduce spelling errors or non-semantic prompts through speech. A simple DoS attack in these scenarios would be to instruct the model to "Keep repeating Hello", but we observe that relying solely on natural instructions limits output length, which is bounded by the maximum length of the LLM's supervised finetuning (SFT) data. To overcome this limitation, we propose poisoning-based DoS (P-DoS) attacks for LLMs, demonstrating that injecting a single poisoned sample designed for DoS purposes can break the output length limit. For example, a poisoned sample can successfully attack GPT-4o and GPT-4o mini (via OpenAI's finetuning API) using less than $1, causing repeated outputs up to the maximum inference length (16K tokens, compared to 0.5K before poisoning). Additionally, we perform comprehensive ablation studies on open-source LLMs and extend our method to LLM agents, where attackers can control both the finetuning dataset and algorithm. Our findings underscore the urgent need for defenses against P-DoS attacks to secure LLMs. Our code is available at https://github.com/sail-sg/P-DoS.
- Published
- 2024
10. On The Largest Character Degree And Solvable Subgroups Of Finite Groups
- Author
-
Wu, Zongshu and Yang, Yong
- Subjects
Mathematics - Group Theory - Abstract
Let $G$ be a finite group, and $\pi$ be a set of primes. The $\pi$-core $\mathbf{O}_\pi(G)$ is the unique maximal normal $\pi$-subgroup of $G$, and $b(G)$ is the largest irreducible character degree of $G$. In 2017, Qian and Yang proved that if $H$ is a solvable $\pi$-subgroup of $G$, then $|H\mathbf{O}_\pi(G)/\mathbf{O}_\pi(G)|\le b(G)^3$. In this paper, we improve the exponent of $3$ to $3\log_{504}(168)<2.471$.
- Published
- 2024
11. Searching for MeV-scale Axion-like Particles and Dark Photons with PandaX-4T
- Author
-
PandaX Collaboration, Li, Tao, Bo, Zihao, Chen, Wei, Chen, Xun, Chen, Yunhua, Cheng, Zhaokan, Cui, Xiangyi, Fan, Yingjie, Fang, Deqing, Gao, Zhixing, Geng, Lisheng, Giboni, Karl, Guo, Xunan, Guo, Xuyuan, Guo, Zichao, Han, Chencheng, He, Ke HanChangda, He, Jinrong, Huang, Di, Huang, Houqi, Huang, Junting, Hou, Ruquan, Hou, Yu, Ji, Xiangdong, Ji, Xiangpan, Ju, Yonglin, Li, Chenxiang, Li, Jiafu, Li, Mingchuan, Li, Shuaijie, Li, Zhiyuan, Lin, Qing, Liu, Jianglai, Lu, Congcong, Lu, Xiaoying, Luo, Lingyin, Luo, Yunyang, Ma, Wenbo, Ma, Yugang, Mao, Yajun, Meng, Yue, Ning, Xuyang, Pang, Binyu, Qi, Ningchun, Qian, Zhicheng, Ren, Xiangxiang, Shan, Dong, Shang, Xiaofeng, Shao, Xiyuan, Shen, Guofang, Shen, Manbin, Sun, Wenliang, Tao, Yi, Wang, Anqing, Wang, Guanbo, Wang, Hao, Wang, Jiamin, Wang, Lei, Wang, Meng, Wang, Qiuhong, Wang, Shaobo, Wang, Siguang, Wang, Wei, Wang, Xiuli, Wang, Xu, Wang, Zhou, Wei, Yuehuan, Wu, Weihao, Wu, Yuan, Xiao, Mengjiao, Xiao, Xiang, Xiong, Kaizhi, Xu, Yifan, Yao, Shunyu, Yan, Binbin, Yan, Xiyu, Yang, Yong, Ye, Peihua, Yu, Chunxu, Yuan, Ying, Yuan, Zhe, Yun, Youhui, Zeng, Xinning, Zhang, Minzhen, Zhang, Peng, Zhang, Shibo, Zhang, Shu, Zhang, Tao, Zhang, Wei, Zhang, Yang, Zhang, Yingxin, Zhang, Yuanyuan, Zhao, Li, Zhou, Jifang, Zhou, Jiaxu, Zhou, Jiayi, Zhou, Ning, Zhou, Xiaopeng, Zhou, Yubo, and Zhou, Zhizhen
- Subjects
High Energy Physics - Experiment - Abstract
Axion-like particles (ALPs) and dark photons (DPs) are viable dark matter particle candidates. We have searched for possible ALP/DP signals in the PandaX-4T liquid xenon detector using 94.8 days of data. A binned likelihood fit is constructed to search for possible mono-energetic peaks induced by the absorption processes between ALPs/DPs and atomic electrons of xenon. A detailed temporal model of decays associated with xenon isotopes is introduced to constrain the number of background events. No signal excess over background expectations is observed, and we have established the most stringent exclusion limits for most ALP/DP masses ranging from 150 keV/$c^2$ to 1 MeV/$c^2$.
- Published
- 2024
12. Exploring New Physics with PandaX-4T Low Energy Electronic Recoil Data
- Author
-
PandaX Collaboration, Zeng, Xinning, Bo, Zihao, Chen, Wei, Chen, Xun, Chen, Yunhua, Cheng, Zhaokan, Cui, Xiangyi, Fan, Yingjie, Fang, Deqing, Gao, Zhixing, Geng, Lisheng, Giboni, Karl, Guo, Xunan, Guo, Xuyuan, Guo, Zichao, Han, Chencheng, He, Ke HanChangda, He, Jinrong, Huang, Di, Huang, Houqi, Huang, Junting, Hou, Ruquan, Hou, Yu, Ji, Xiangdong, Ji, Xiangpan, Ju, Yonglin, Li, Chenxiang, Li, Jiafu, Li, Mingchuan, Li, Shuaijie, Li, Tao, Li, Zhiyuan, Lin, Qing, Liu, Jianglai, Lu, Congcong, Lu, Xiaoying, Luo, Lingyin, Luo, Yunyang, Ma, Wenbo, Ma, Yugang, Mao, Yajun, Meng, Yue, Ning, Xuyang, Pang, Binyu, Qi, Ningchun, Qian, Zhicheng, Ren, Xiangxiang, Shan, Dong, Shang, Xiaofeng, Shao, Xiyuan, Shen, Guofang, Shen, Manbin, Sun, Wenliang, Tao, Yi, Wang, Anqing, Wang, Guanbo, Wang, Hao, Wang, Jiamin, Wang, Lei, Wang, Meng, Wang, Qiuhong, Wang, Shaobo, Wang, Siguang, Wang, Wei, Wang, Xiuli, Wang, Xu, Wang, Zhou, Wei, Yuehuan, Wu, Weihao, Wu, Yuan, Xiao, Mengjiao, Xiao, Xiang, Xiong, Kaizhi, Xu, Yifan, Yao, Shunyu, Yan, Binbin, Yan, Xiyu, Yang, Yong, Ye, Peihua, Yu, Chunxu, Yuan, Ying, Yuan, Zhe, Yun, Youhui, Zhang, Minzhen, Zhang, Peng, Zhang, Shibo, Zhang, Shu, Zhang, Tao, Zhang, Wei, Zhang, Yang, Zhang, Yingxin, Zhang, Yuanyuan, Zhao, Li, Zhou, Jifang, Zhou, Jiaxu, Zhou, Jiayi, Zhou, Ning, Zhou, Xiaopeng, Zhou, Yubo, and Zhou, Zhizhen
- Subjects
High Energy Physics - Experiment - Abstract
New particles beyond the Standard Model of particle physics, such as axions, can be effectively searched through their interactions with electrons. We use the large liquid xenon detector PandaX-4T to search for novel electronic recoil signals induced by solar axions, neutrinos with anomalous magnetic moment, axion-like particles, dark photons, and light fermionic dark matter. A detailed background model is established with the latest datasets with 1.54 $\rm tonne \cdot year$ exposure. No significant excess above the background has been observed, and we have obtained competitive constraints for axion couplings, neutrino magnetic moment, and fermionic dark matter interactions.
- Published
- 2024
13. Dark Matter Search Results from 1.54 Tonne$\cdot$Year Exposure of PandaX-4T
- Author
-
PandaX Collaboration, Bo, Zihao, Chen, Wei, Chen, Xun, Chen, Yunhua, Cheng, Zhaokan, Cui, Xiangyi, Fan, Yingjie, Fang, Deqing, Gao, Zhixing, Geng, Lisheng, Giboni, Karl, Guo, Xunan, Guo, Xuyuan, Guo, Zichao, Han, Chencheng, Han, Ke, He, Changda, He, Jinrong, Huang, Di, Huang, Houqi, Huang, Junting, Hou, Ruquan, Hou, Yu, Ji, Xiangdong, Ji, Xiangpan, Ju, Yonglin, Li, Chenxiang, Li, Jiafu, Li, Mingchuan, Li, Shuaijie, Li, Tao, Li, Zhiyuan, Lin, Qing, Liu, Jianglai, Lu, Congcong, Lu, Xiaoying, Luo, Lingyin, Luo, Yunyang, Ma, Wenbo, Ma, Yugang, Mao, Yajun, Meng, Yue, Ning, Xuyang, Pang, Binyu, Qi, Ningchun, Qian, Zhicheng, Ren, Xiangxiang, Shan, Dong, Shang, Xiaofeng, Shao, Xiyuan, Shen, Guofang, Shen, Manbin, Sun, Wenliang, Tao, Yi, Wang, Anqing, Wang, Guanbo, Wang, Hao, Wang, Jiamin, Wang, Lei, Wang, Meng, Wang, Qiuhong, Wang, Shaobo, Wang, Siguang, Wang, Wei, Wang, Xiuli, Wang, Xu, Wang, Zhou, Wei, Yuehuan, Wu, Weihao, Wu, Yuan, Xiao, Mengjiao, Xiao, Xiang, Xiong, Kaizhi, Xu, Yifan, Yao, Shunyu, Yan, Binbin, Yan, Xiyu, Yang, Yong, Ye, Peihua, Yu, Chunxu, Yuan, Ying, Yuan, Zhe, Yun, Youhui, Zeng, Xinning, Zhang, Minzhen, Zhang, Peng, Zhang, Shibo, Zhang, Shu, Zhang, Tao, Zhang, Wei, Zhang, Yang, Zhang, Yingxin, Zhang, Yuanyuan, Zhao, Li, Zhou, Jifang, Zhou, Jiaxu, Zhou, Jiayi, Zhou, Ning, Zhou, Xiaopeng, Zhou, Yubo, and Zhou, Zhizhen
- Subjects
High Energy Physics - Experiment - Abstract
In this letter, we report the dark matter search results from the commissioning run and the first science run of the PandaX-4T experiment. A blind analysis is carried out on the entire data set. The data processing is improved compared to previous work, unifying the low-level signal reconstruction in a wide energy range up to 120 keV. With a total exposure of 1.54 tonne$\cdot$year, no significant excess of nuclear recoil events is found. The lowest 90% confidence level exclusion on the spin-independent cross section is $1.6 \times 10^{-47} \mathrm{cm}^2$ at a dark matter mass of 40 GeV$/c^2$. Our results represent the most stringent constraint for a dark matter mass above 100 GeV$/c^2$.
- Published
- 2024
14. First Indication of Solar $^8$B Neutrino Flux through Coherent Elastic Neutrino-Nucleus Scattering in PandaX-4T
- Author
-
PandaX Collaboration, Bo, Zihao, Chen, Wei, Chen, Xun, Chen, Yunhua, Cheng, Zhaokan, Cui, Xiangyi, Fan, Yingjie, Fang, Deqing, Gao, Zhixing, Geng, Lisheng, Giboni, Karl, Guo, Xunan, Guo, Xuyuan, Guo, Zichao, Han, Chencheng, Han, Ke, He, Changda, He, Jinrong, Huang, Di, Huang, Houqi, Huang, Junting, Hou, Ruquan, Hou, Yu, Ji, Xiangdong, Ji, Xiangpan, Ju, Yonglin, Li, Chenxiang, Li, Jiafu, Li, Mingchuan, Li, Shuaijie, Li, Tao, Li, Zhiyuan, Lin, Qing, Liu, Jianglai, Lu, Congcong, Lu, Xiaoying, Luo, Lingyin, Luo, Yunyang, Ma, Wenbo, Ma, Yugang, Mao, Yajun, Meng, Yue, Ning, Xuyang, Pang, Binyu, Qi, Ningchun, Qian, Zhicheng, Ren, Xiangxiang, Shan, Dong, Shang, Xiaofeng, Shao, Xiyuan, Shen, Guofang, Shen, Manbin, Sun, Wenliang, Tao, Yi, Wang, Anqing, Wang, Guanbo, Wang, Hao, Wang, Jiamin, Wang, Lei, Wang, Meng, Wang, Qiuhong, Wang, Shaobo, Wang, Siguang, Wang, Wei, Wang, Xiuli, Wang, Xu, Wang, Zhou, Wei, Yuehuan, Wu, Weihao, Wu, Yuan, Xiao, Mengjiao, Xiao, Xiang, Xiong, Kaizhi, Xu, Yifan, Yao, Shunyu, Yan, Binbin, Yan, Xiyu, Yang, Yong, Ye, Peihua, Yu, Chunxu, Yuan, Ying, Yuan, Zhe, Yun, Youhui, Zeng, Xinning, Zhang, Minzhen, Zhang, Peng, Zhang, Shibo, Zhang, Shu, Zhang, Tao, Zhang, Wei, Zhang, Yang, Zhang, Yingxin, Zhang, Yuanyuan, Zhao, Li, Zhou, Jifang, Zhou, Jiaxu, Zhou, Jiayi, Zhou, Ning, Zhou, Xiaopeng, Zhou, Yubo, and Zhou, Zhizhen
- Subjects
High Energy Physics - Experiment ,Astrophysics - Solar and Stellar Astrophysics ,Nuclear Experiment - Abstract
The PandaX-4T liquid xenon detector at the China Jinping Underground Laboratory is used to measure the solar $^8$B neutrino flux by detecting neutrinos through coherent scattering with xenon nuclei. Data samples requiring the coincidence of scintillation and ionization signals (paired), as well as unpaired ionization-only signals (US2), are selected with energy threshold of approximately 1.1 keV (0.33 keV) nuclear recoil energy. Combining the commissioning run and the first science run of PandaX-4T, a total exposure of 1.20 and 1.04 tonne$\cdot$year are collected for the paired and US2, respectively. After unblinding, 3 and 332 events are observed with an expectation of 2.8$\pm$0.5 and 251$\pm$32 background events, for the paired and US2 data, respectively. A combined analysis yields a best-fit $^8$B neutrino signal of 3.5 (75) events from the paired (US2) data sample, with $\sim$37\% uncertainty, and the background-only hypothesis is disfavored at 2.64$\sigma$ significance. This gives a solar $^8$B neutrino flux of ($8.4\pm3.1$)$\times$10$^6$ cm$^{-2}$s$^{-1}$, consistent with the standard solar model prediction. It is also the first indication of solar $^8$B neutrino ``fog'' in a dark matter direct detection experiment., Comment: Accepted by Physical Review Letters
- Published
- 2024
15. Restricted Cohomology of Heisenberg Lie Algebras
- Author
-
Yang, Yong
- Subjects
Mathematics - Representation Theory ,17B50, 17B56 - Abstract
The Heisenberg Lie algebras over an algebraically closed field F of characteristic p > 0 always admit a family of restricted Lie algebras. We use the ordinary 1- and 2-cohomology spaces with adjoint coefficients to compute the restricted 1- and 2-cohomology spaces of these restricted Heisenberg Lie algebras. We describe the infinitesimal restricted deformations of the restricted Lie algebras., Comment: arXiv admin note: text overlap with arXiv:2402.14249. arXiv admin note: text overlap with arXiv:2402.14249
- Published
- 2024
16. Large Language Model-Augmented Auto-Delineation of Treatment Target Volume in Radiation Therapy
- Author
-
Rajendran, Praveenbalaji, Yang, Yong, Niedermayr, Thomas R., Gensheimer, Michael, Beadle, Beth, Le, Quynh-Thu, Xing, Lei, and Dai, Xianjin
- Subjects
Physics - Medical Physics ,Computer Science - Artificial Intelligence ,Computer Science - Computer Vision and Pattern Recognition - Abstract
Radiation therapy (RT) is one of the most effective treatments for cancer, and its success relies on the accurate delineation of targets. However, target delineation is a comprehensive medical decision that currently relies purely on manual processes by human experts. Manual delineation is time-consuming, laborious, and subject to interobserver variations. Although the advancements in artificial intelligence (AI) techniques have significantly enhanced the auto-contouring of normal tissues, accurate delineation of RT target volumes remains a challenge. In this study, we propose a visual language model-based RT target volume auto-delineation network termed Radformer. The Radformer utilizes a hierarichal vision transformer as the backbone and incorporates large language models to extract text-rich features from clinical data. We introduce a visual language attention module (VLAM) for integrating visual and linguistic features for language-aware visual encoding (LAVE). The Radformer has been evaluated on a dataset comprising 2985 patients with head-and-neck cancer who underwent RT. Metrics, including the Dice similarity coefficient (DSC), intersection over union (IOU), and 95th percentile Hausdorff distance (HD95), were used to evaluate the performance of the model quantitatively. Our results demonstrate that the Radformer has superior segmentation performance compared to other state-of-the-art models, validating its potential for adoption in RT practice.
- Published
- 2024
17. Automated radiotherapy treatment planning guided by GPT-4Vision
- Author
-
Liu, Sheng, Pastor-Serrano, Oscar, Chen, Yizheng, Gopaulchan, Matthew, Liang, Weixing, Buyyounouski, Mark, Pollom, Erqi, Le, Quynh-Thu, Gensheimer, Michael, Dong, Peng, Yang, Yong, Zou, James, and Xing, Lei
- Subjects
Physics - Medical Physics ,Computer Science - Artificial Intelligence - Abstract
Radiotherapy treatment planning is a time-consuming and potentially subjective process that requires the iterative adjustment of model parameters to balance multiple conflicting objectives. Recent advancements in large foundation models offer promising avenues for addressing the challenges in planning and clinical decision-making. This study introduces GPT-RadPlan, a fully automated treatment planning framework that harnesses prior radiation oncology knowledge encoded in multi-modal large language models, such as GPT-4Vision (GPT-4V) from OpenAI. GPT-RadPlan is made aware of planning protocols as context and acts as an expert human planner, capable of guiding a treatment planning process. Via in-context learning, we incorporate clinical protocols for various disease sites as prompts to enable GPT-4V to acquire treatment planning domain knowledge. The resulting GPT-RadPlan agent is integrated into our in-house inverse treatment planning system through an API. The efficacy of the automated planning system is showcased using multiple prostate and head & neck cancer cases, where we compared GPT-RadPlan results to clinical plans. In all cases, GPT-RadPlan either outperformed or matched the clinical plans, demonstrating superior target coverage and organ-at-risk sparing. Consistently satisfying the dosimetric objectives in the clinical protocol, GPT-RadPlan represents the first multimodal large language model agent that mimics the behaviors of human planners in radiation oncology clinics, achieving remarkable results in automating the treatment planning process without the need for additional training., Comment: 12 pages, 4 figures
- Published
- 2024
18. A Survey of AIOps for Failure Management in the Era of Large Language Models
- Author
-
Zhang, Lingzhe, Jia, Tong, Jia, Mengxi, Wu, Yifan, Liu, Aiwei, Yang, Yong, Wu, Zhonghai, Hu, Xuming, Yu, Philip S., and Li, Ying
- Subjects
Computer Science - Software Engineering - Abstract
As software systems grow increasingly intricate, Artificial Intelligence for IT Operations (AIOps) methods have been widely used in software system failure management to ensure the high availability and reliability of large-scale distributed software systems. However, these methods still face several challenges, such as lack of cross-platform generality and cross-task flexibility. Fortunately, recent advancements in large language models (LLMs) can significantly address these challenges, and many approaches have already been proposed to explore this field. However, there is currently no comprehensive survey that discusses the differences between LLM-based AIOps and traditional AIOps methods. Therefore, this paper presents a comprehensive survey of AIOps technology for failure management in the LLM era. It includes a detailed definition of AIOps tasks for failure management, the data sources for AIOps, and the LLM-based approaches adopted for AIOps. Additionally, this survey explores the AIOps subtasks, the specific LLM-based approaches suitable for different AIOps subtasks, and the challenges and future directions of the domain, aiming to further its development and application., Comment: 35 pages
- Published
- 2024
19. Multivariate Log-based Anomaly Detection for Distributed Database
- Author
-
Zhang, Lingzhe, Jia, Tong, Jia, Mengxi, Li, Ying, Yang, Yong, and Wu, Zhonghai
- Subjects
Computer Science - Software Engineering - Abstract
Distributed databases are fundamental infrastructures of today's large-scale software systems such as cloud systems. Detecting anomalies in distributed databases is essential for maintaining software availability. Existing approaches, predominantly developed using Loghub-a comprehensive collection of log datasets from various systems-lack datasets specifically tailored to distributed databases, which exhibit unique anomalies. Additionally, there's a notable absence of datasets encompassing multi-anomaly, multi-node logs. Consequently, models built upon these datasets, primarily designed for standalone systems, are inadequate for distributed databases, and the prevalent method of deeming an entire cluster anomalous based on irregularities in a single node leads to a high false-positive rate. This paper addresses the unique anomalies and multivariate nature of logs in distributed databases. We expose the first open-sourced, comprehensive dataset with multivariate logs from distributed databases. Utilizing this dataset, we conduct an extensive study to identify multiple database anomalies and to assess the effectiveness of state-of-the-art anomaly detection using multivariate log data. Our findings reveal that relying solely on logs from a single node is insufficient for accurate anomaly detection on distributed database. Leveraging these insights, we propose MultiLog, an innovative multivariate log-based anomaly detection approach tailored for distributed databases. Our experiments, based on this novel dataset, demonstrate MultiLog's superiority, outperforming existing state-of-the-art methods by approximately 12%., Comment: Accepted by KDD'24
- Published
- 2024
- Full Text
- View/download PDF
20. Not All Prompts Are Secure: A Switchable Backdoor Attack Against Pre-trained Vision Transformers
- Author
-
Yang, Sheng, Bai, Jiawang, Gao, Kuofeng, Yang, Yong, Li, Yiming, and Xia, Shu-tao
- Subjects
Computer Science - Computer Vision and Pattern Recognition ,Computer Science - Cryptography and Security ,Computer Science - Machine Learning - Abstract
Given the power of vision transformers, a new learning paradigm, pre-training and then prompting, makes it more efficient and effective to address downstream visual recognition tasks. In this paper, we identify a novel security threat towards such a paradigm from the perspective of backdoor attacks. Specifically, an extra prompt token, called the switch token in this work, can turn the backdoor mode on, i.e., converting a benign model into a backdoored one. Once under the backdoor mode, a specific trigger can force the model to predict a target class. It poses a severe risk to the users of cloud API, since the malicious behavior can not be activated and detected under the benign mode, thus making the attack very stealthy. To attack a pre-trained model, our proposed attack, named SWARM, learns a trigger and prompt tokens including a switch token. They are optimized with the clean loss which encourages the model always behaves normally even the trigger presents, and the backdoor loss that ensures the backdoor can be activated by the trigger when the switch is on. Besides, we utilize the cross-mode feature distillation to reduce the effect of the switch token on clean samples. The experiments on diverse visual recognition tasks confirm the success of our switchable backdoor attack, i.e., achieving 95%+ attack success rate, and also being hard to be detected and removed. Our code is available at https://github.com/20000yshust/SWARM.
- Published
- 2024
21. Adversarial Robustness for Visual Grounding of Multimodal Large Language Models
- Author
-
Gao, Kuofeng, Bai, Yang, Bai, Jiawang, Yang, Yong, and Xia, Shu-Tao
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
Multi-modal Large Language Models (MLLMs) have recently achieved enhanced performance across various vision-language tasks including visual grounding capabilities. However, the adversarial robustness of visual grounding remains unexplored in MLLMs. To fill this gap, we use referring expression comprehension (REC) as an example task in visual grounding and propose three adversarial attack paradigms as follows. Firstly, untargeted adversarial attacks induce MLLMs to generate incorrect bounding boxes for each object. Besides, exclusive targeted adversarial attacks cause all generated outputs to the same target bounding box. In addition, permuted targeted adversarial attacks aim to permute all bounding boxes among different objects within a single image. Extensive experiments demonstrate that the proposed methods can successfully attack visual grounding capabilities of MLLMs. Our methods not only provide a new perspective for designing novel attacks but also serve as a strong baseline for improving the adversarial robustness for visual grounding of MLLMs., Comment: ICLR 2024 Workshop on Reliable and Responsible Foundation Models
- Published
- 2024
22. On the orbits of a finite solvable primitive linear group
- Author
-
Yang, Yong and You, Mengxi
- Subjects
Mathematics - Group Theory ,20C20 - Abstract
In this paper, we strengthen a result of Seager regarding the number of orbits of a solvable primitive linear group.
- Published
- 2024
23. Hunyuan-DiT: A Powerful Multi-Resolution Diffusion Transformer with Fine-Grained Chinese Understanding
- Author
-
Li, Zhimin, Zhang, Jianwei, Lin, Qin, Xiong, Jiangfeng, Long, Yanxin, Deng, Xinchi, Zhang, Yingfang, Liu, Xingchao, Huang, Minbin, Xiao, Zedong, Chen, Dayou, He, Jiajun, Li, Jiahao, Li, Wenyue, Zhang, Chen, Quan, Rongwei, Lu, Jianxiang, Huang, Jiabin, Yuan, Xiaoyan, Zheng, Xiaoxiao, Li, Yixuan, Zhang, Jihong, Zhang, Chao, Chen, Meng, Liu, Jie, Fang, Zheng, Wang, Weiyan, Xue, Jinbao, Tao, Yangyu, Zhu, Jianchen, Liu, Kai, Lin, Sihuan, Sun, Yifu, Li, Yun, Wang, Dongdong, Chen, Mingtao, Hu, Zhichao, Xiao, Xiao, Chen, Yan, Liu, Yuhong, Liu, Wei, Wang, Di, Yang, Yong, Jiang, Jie, and Lu, Qinglin
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
We present Hunyuan-DiT, a text-to-image diffusion transformer with fine-grained understanding of both English and Chinese. To construct Hunyuan-DiT, we carefully design the transformer structure, text encoder, and positional encoding. We also build from scratch a whole data pipeline to update and evaluate data for iterative model optimization. For fine-grained language understanding, we train a Multimodal Large Language Model to refine the captions of the images. Finally, Hunyuan-DiT can perform multi-turn multimodal dialogue with users, generating and refining images according to the context. Through our holistic human evaluation protocol with more than 50 professional human evaluators, Hunyuan-DiT sets a new state-of-the-art in Chinese-to-image generation compared with other open-source models. Code and pretrained models are publicly available at github.com/Tencent/HunyuanDiT, Comment: Project Page: https://dit.hunyuan.tencent.com/
- Published
- 2024
24. Dual-grating single-shot pump-probe technique
- Author
-
Yu, Tianchen, Yang, Junyi, Zhou, Wenfa, Li, Zhongguo, Wu, Xingzhi, Fang, Yu, Yang, Yong, and Song, Yinglin
- Subjects
Physics - Optics ,Physics - Applied Physics - Abstract
A simple and effective single-shot pump-probe technique is reported for studying the ultrafast dynamic processes in various materials. Using only two commercial gratings, a large time window of ~ 95.58 ps is spatially encoded in a single probe pulse, and single-shot time-resolved measurements are implemented. This time window exceeds the maximum reported values for single-shot pump-probe techniques using the echelon or angle beam encoding strategy. The phase difference problem in the echelon encoding strategies is also eliminated and a customized echelon is not needed in this technique. The ultrafast dynamic processes of ZnSe and indolium squaraine at a wavelength of 650 nm were investigated using this technique., Comment: 14 pages, 4 figures
- Published
- 2024
25. Special Characters Attack: Toward Scalable Training Data Extraction From Large Language Models
- Author
-
Bai, Yang, Pei, Ge, Gu, Jindong, Yang, Yong, and Ma, Xingjun
- Subjects
Computer Science - Cryptography and Security ,Computer Science - Artificial Intelligence ,Computer Science - Computation and Language ,Computer Science - Machine Learning - Abstract
Large language models (LLMs) have achieved remarkable performance on a wide range of tasks. However, recent studies have shown that LLMs can memorize training data and simple repeated tokens can trick the model to leak the data. In this paper, we take a step further and show that certain special characters or their combinations with English letters are stronger memory triggers, leading to more severe data leakage. The intuition is that, since LLMs are trained with massive data that contains a substantial amount of special characters (e.g. structural symbols {, } of JSON files, and @, # in emails and online posts), the model may memorize the co-occurrence between these special characters and the raw texts. This motivates us to propose a simple but effective Special Characters Attack (SCA) to induce training data leakage. Our experiments verify the high effectiveness of SCA against state-of-the-art LLMs: they can leak diverse training data, such as code corpus, web pages, and personally identifiable information, and sometimes generate non-stop outputs as a byproduct. We further show that the composition of the training data corpus can be revealed by inspecting the leaked data -- one crucial piece of information for pre-training high-performance LLMs. Our work can help understand the sensitivity of LLMs to special characters and identify potential areas for improvement.
- Published
- 2024
26. Search for Cosmic-ray Boosted Sub-MeV Dark-Matter-Electron Scattering in PandaX-4T
- Author
-
Shang, Xiaofeng, Abdukerim, Abdusalam, Bo, Zihao, Chen, Wei, Chen, Xun, Cheng, Chen, Cheng, Zhaokan, Cui, Xiangyi, Fan, Yingjie, Fang, Deqing, Geng, Lisheng, Giboni, Karl, Guo, Xuyuan, Han, Chencheng, Han, Ke, He, Changda, He, Jinrong, Huang, Di, Huang, Junting, Huang, Zhou, Hou, Ruquan, Hou, Yu, Ji, Xiangdong, Ju, Yonglin, Li, Chenxiang, Li, Jiafu, Li, Mingchuan, Li, Shuaijie, Li, Tao, Lin, Qing, Liu, Jianglai, Lu, Congcong, Lu, Xiaoying, Luo, Lingyin, Luo, Yunyang, Ma, Wenbo, Ma, Yugang, Mao, Yajun, Meng, Yue, Ning, Xuyang, Pang, Binyu, Qi, Ningchun, Qian, Zhicheng, Ren, Xiangxiang, Shaheed, Nasir, Shao, Xiyuan, Shen, Guofang, Si, Lin, Sun, Wenliang, Tan, Andi, Tao, Yi, Wang, Anqing, Wang, Meng, Wang, Qiuhong, Wang, Shaobo, Wang, Siguang, Wang, Wei, Wang, Xiuli, Wang, Xu, Wang, Zhou, Wei, Yuehuan, Wu, Mengmeng, Wu, Weihao, Wu, Yuan, Xiao, Mengjiao, Xiao, Xiang, Yan, Binbin, Yan, Xiyu, Yang, Yong, Yu, Chunxu, Yuan, Ying, Yuan, Zhe, Yun, Youhui, Zeng, Xinning, Zhang, Minzhen, Zhang, Peng, Zhang, Shibo, Zhang, Shu, Zhang, Tao, Zhang, Wei, Zhang, Yang, Zhang, Yingxin, Zhang, Yuanyuan, Zhao, Li, Zhou, Jifang, Zhou, Ning, Zhou, Xiaopeng, Zhou, Yong, Zhou, Yubo, Zhou, Zhizhen, Ge, Shao-Feng, and Xia, Chen
- Subjects
High Energy Physics - Experiment ,High Energy Physics - Phenomenology - Abstract
We report the first search for the elastic scatterings between cosmic-ray boosted sub-MeV dark matter and electrons in the PandaX-4T liquid xenon experiment. Sub-MeV dark matter particles can be accelerated by scattering with electrons in the cosmic rays and produce detectable electron recoil signals in the detector. Using the commissioning data from PandaX-4T of 0.63~tonne$\cdot$year exposure, we set new constraints on DM-electron scattering cross sections for DM masses ranging from 10~eV/$c^2$ to 3~keV/$c^2$., Comment: 6 pages, 3 figures
- Published
- 2024
- Full Text
- View/download PDF
27. Detecting Neutrinos from Supernova Bursts in PandaX-4T
- Author
-
Pang, Binyu, Abdukerim, Abdusalam, Bo, Zihao, Chen, Wei, Chen, Xun, Cheng, Chen, Cheng, Zhaokan, Cui, Xiangyi, Fan, Yingjie, Fang, Deqing, Fu, Changbo, Fu, Mengting, Geng, Lisheng, Giboni, Karl, Gu, Linhui, Guo, Xuyuan, Han, Chencheng, Han, Ke, He, Changda, He, Jinrong, Huang, Di, Huang, Yanlin, Huang, Junting, Huang, Zhou, Hou, Ruquan, Hou, Yu, Ji, Xiangdong, Ju, Yonglin, Li, Chenxiang, Li, Jiafu, Li, Mingchuan, Li, Shuaijie, Li, Tao, Lin, Qing, Liu, Jianglai, Lu, Congcong, Lu, Xiaoying, Luo, Lingyin, Luo, Yunyang, Ma, Wenbo, Ma, Yugang, Mao, Yajun, Meng, Yue, Ning, Xuyang, Qi, Ningchun, Qian, Zhicheng, Ren, Xiangxiang, Shaheed, Nasir, Shang, Xiaofeng, Shao, Xiyuan, Shen, Guofang, Si, Lin, Sun, Wenliang, Tan, Andi, Tao, Yi, Wang, Anqing, Wang, Meng, Wang, Qiuhong, Wang, Shaobo, Wang, Siguang, Wang, Wei, Wang, Xiuli, Wang, Zhou, Wei, Yuehuan, Wu, Mengmeng, Wu, Weihao, Xia, Jingkai, Xiao, Mengjiao, Xiao, Xiang, Xie, Pengwei, Yan, Binbin, Yan, Xiyu, Yang, Jijun, Yang, Yong, Yao, Yukun, Yu, Chunxu, Yuan, Ying, Yuan, Zhe, Zeng, Xinning, Zhang, Dan, Zhang, Minzhen, Zhang, Peng, Zhang, Shibo, Zhang, Shu, Zhang, Tao, Zhang, Wei, Zhang, Yang, Zhang, Yingxin, Zhang, Yuanyuan, Zhao, Li, Zheng, Qibin, Zhou, Jifang, Zhou, Ning, Zhou, Xiaopeng, Zhou, Yong, and Zhou, Yubo
- Subjects
High Energy Physics - Experiment ,Physics - Instrumentation and Detectors - Abstract
Neutrinos from core-collapse supernovae are essential for the understanding of neutrino physics and stellar evolution. The dual-phase xenon dark matter detectors can provide a way to track explosions of galactic supernovae by detecting neutrinos through coherent elastic neutrino-nucleus scatterings. In this study, a variation of progenitor masses as well as explosion models are assumed to predict the neutrino fluxes and spectra, which result in the number of expected neutrino events ranging from 6.6 to 13.7 at a distance of 10 kpc over a 10-second duration with negligible backgrounds at PandaX-4T. Two specialized triggering alarms for monitoring supernova burst neutrinos are built. The efficiency of detecting supernova explosions at various distances in the Milky Way is estimated. These alarms will be implemented in the real-time supernova monitoring system at PandaX-4T in the near future, providing the astronomical communities with supernova early warnings., Comment: 9 pages,6 figures
- Published
- 2024
28. Lateral Control of Brain-Controlled Vehicle Based on SVM Probability Output Model
- Author
-
Pan, Hongguang, Yu, Xinyu, and Yang, Yong
- Subjects
Quantitative Biology - Neurons and Cognition - Abstract
The non-stationary characteristics of EEG signal and the individual differences of brain-computer interfaces (BCIs) lead to poor performance in the control process of the brain-controlled vehicles (BCVs). In this paper, by combining steady-state visual evoked potential (SSVEP) interactive interface, brain instructions generation module and vehicle lateral control module, a probabilistic output model based on support vector machine (SVM) is proposed for BCV lateral control to improve the driving performance. Firstly, a filter bank common spatial pattern (FBCSP) algorithm is introduced into the brain instructions generation module, which can improve the off-line decoding performance. Secondly, a sigmod-fitting SVM (SF-SVM) is trained based on the sigmod-fitting method and the lateral control module is developed, which can produce all commands in the form of probability instead of specific single command. Finally, a pre-experiment and two road-keeping experiments are conducted. In the pre-experiment, the experiment results show that, the average highest off-line accuracy among subjects is 95.64\%, while for those in the online stage, the average accuracy is only 84.44\%. In the road-keeping experiments, the task completion rate in the two designed scenes increased by 25.6\% and 20\%, respectively.
- Published
- 2024
29. Signal Response Model in PandaX-4T
- Author
-
Luo, Yunyang, Bo, Zihao, Zhang, Shibo, Abdukerim, Abdusalam, Cheng, Chen, Chen, Wei, Chen, Xun, Chen, Yunhua, Cheng, Zhaokan, Cui, Xiangyi, Fan, Yingjie, Fang, Deqing, Fu, Changbo, Fu, Mengting, Geng, Lisheng, Giboni, Karl, Gu, Linhui, Guo, Xuyuan, Han, Chencheng, Han, Ke, He, Changda, He, Jinrong, Huang, Di, Huang, Yanlin, Huang, Zhou, Hou, Ruquan, Ji, Xiangdong, Ju, Yonglin, Li, Chenxiang, Li, Jiafu, Li, Mingchuan, Li, Shu, Li, Shuaijie, Lin, Qing, Liu, Jianglai, Lu, Xiaoying, Luo, Lingyin, Ma, Wenbo, Ma, Yugang, Mao, Yajun, Shaheed, Nasir, Meng, Yue, Ning, Xuyang, Qi, Ningchun, Qian, Zhicheng, Ren, Xiangxiang, Shang, Changsong, Shang, Xiaofeng, Shen, Guofang, Si, Lin, Sun, Wenliang, Tan, Andi, Tao, Yi, Wang, Anqing, Wang, Meng, Wang, Qiuhong, Wang, Shaobo, Wang, Siguang, Wang, Wei, Wang, Xiuli, Wang, Zhou, Wei, Yuehuan, Wu, Mengmeng, Wu, Weihao, Xia, Jingkai, Xiao, Mengjiao, Xiao, Xiang, Xie, Pengwei, Yan, Binbin, Yan, Xiyu, Yang, Jijun, Yang, Yong, Yu, Chunxu, Yuan, Jumin, Yuan, Ying, Yuan, Zhe, Zeng, Xinning, Zhang, Dan, Zhang, Minzhen, Zhang, Peng, Zhang, Shu, Zhang, Tao, Zhang, Yingxin, Zhang, Yuanyuan, Zhao, Li, Zheng, Qibin, Zhou, Jifang, Zhou, Ning, Zhou, Xiaopeng, Zhou, Yong, and Zhou, Yubo
- Subjects
Physics - Instrumentation and Detectors ,High Energy Physics - Experiment - Abstract
PandaX-4T experiment is a deep-underground dark matter direct search experiment that employs a dual-phase time projection chamber with a sensitive volume containing 3.7 tonne of liquid xenon. The detector of PandaX-4T is capable of simultaneously collecting the primary scintillation and ionization signals, utilizing their ratio to discriminate dark matter signals from background sources such as gamma rays and beta particles. The signal response model plays a crucial role in interpreting the data obtained by PandaX-4T. It describes the conversion from the deposited energy by dark matter interactions to the detectable signals within the detector. The signal response model is utilized in various PandaX-4T results. This work provides a comprehensive description of the procedures involved in constructing and parameter-fitting the signal response model for the energy range of approximately 1 keV to 25 keV for electronic recoils and 6 keV to 90 keV for nuclear recoils. It also covers the signal reconstruction, selection, and correction methods, which are crucial components integrated into the signal response model.
- Published
- 2024
30. RCoCo: Contrastive Collective Link Prediction across Multiplex Network in Riemannian Space
- Author
-
Sun, Li, Li, Mengjie, Yang, Yong, Li, Xiao, Liu, Lin, Zhang, Pengfei, and Du, Haohua
- Subjects
Computer Science - Social and Information Networks ,Computer Science - Machine Learning - Abstract
Link prediction typically studies the probability of future interconnection among nodes with the observation in a single social network. More often than not, real scenario is presented as a multiplex network with common (anchor) users active in multiple social networks. In the literature, most existing works study either the intra-link prediction in a single network or inter-link prediction among networks (a.k.a. network alignment), and consider two learning tasks are independent from each other, which is still away from the fact. On the representation space, the vast majority of existing methods are built upon the traditional Euclidean space, unaware of the inherent geometry of social networks. The third issue is on the scarce anchor users. Annotating anchor users is laborious and expensive, and thus it is impractical to work with quantities of anchor users. Herein, in light of the issues above, we propose to study a challenging yet practical problem of Geometry-aware Collective Link Prediction across Multiplex Network. To address this problem, we present a novel contrastive model, RCoCo, which collaborates intra- and inter-network behaviors in Riemannian spaces. In RCoCo, we design a curvature-aware graph attention network ($\kappa-$GAT), conducting attention mechanism in Riemannian manifold whose curvature is estimated by the Ricci curvatures over the network. Thereafter, we formulate intra- and inter-contrastive loss in the manifolds, in which we augment graphs by exploring the high-order structure of community and information transfer on anchor users. Finally, we conduct extensive experiments with 14 strong baselines on 8 real-world datasets, and show the effectiveness of RCoCo., Comment: Accepted by Springer International Journal of Machine Learning and Cybernetics (JMLC), 2024
- Published
- 2024
31. Bifurcation curves of a linear system attached with a bistable nonlinear energy sink
- Author
-
Zheng, Zhiwei, Huang, Xiuchang, and Yang, Yong
- Published
- 2024
- Full Text
- View/download PDF
32. A Novel Synbiotic Protects Against DSS-Induced Colitis in Mice via Anti-inflammatory and Microbiota-Balancing Properties
- Author
-
Yang, Yong, Qiao, Yuyu, Liu, Ge, Chen, Weihao, Zhang, Ting, Liu, Jing, Fan, Weiping, and Tong, Mingwei
- Published
- 2024
- Full Text
- View/download PDF
33. Mechanical Properties Test and Failure Analysis of Composite Foam Sandwich Structure in Ramp-Down Zone
- Author
-
Yang, Kang, Liu, Ziyi, Yang, Yong, Zhou, Guoqing, Su, Changqing, and Feng, Huan
- Published
- 2024
- Full Text
- View/download PDF
34. Industrial product surface defect detection via the fast denoising diffusion implicit model
- Author
-
Wang, Yue, Yang, Yong, Liu, Mingsheng, Tang, Xianghong, Wang, Haibin, Hao, Zhifeng, Shi, Ze, Wang, Gang, Jiang, Botao, and Liu, Chunyang
- Published
- 2024
- Full Text
- View/download PDF
35. Identification of Methamphetamine Abusers Can Be Supported by EEG-Based Wavelet Transform and BiLSTM Networks
- Author
-
Zhou, Hui, Zhang, Jiaqi, Gao, Junfeng, Zeng, Xuanwei, Min, Xiangde, Zhan, Huimiao, Zheng, Hua, Hu, Huaifei, Yang, Yong, and Wei, Shuguang
- Published
- 2024
- Full Text
- View/download PDF
36. The Interaction Between Nutraceuticals and Gut Microbiota: a Novel Therapeutic Approach to Prevent and Treatment Parkinson’s Disease
- Author
-
Yao, Liyan, Yang, Yong, Yang, Xiaowei, and Rezaei, Mohammad J.
- Published
- 2024
- Full Text
- View/download PDF
37. Production and Characterization of Sorghum Sourdough Bread Sequentially Fermented with Monascus purpureus and Lactiplantibacillus plantarum
- Author
-
Liu, Aiping, Zhang, Shun, Li, Qin, Hu, Kaidi, Li, Jianlong, Ao, Xiaolin, He, Li, Chen, Shujuan, Hu, Xinjie, Liu, Shuliang, and Yang, Yong
- Published
- 2024
- Full Text
- View/download PDF
38. Electromagnetic Coupling Field Effect on Microstructure and Wear Behavior of Laser-Clad 304 Stainless Steel
- Author
-
Li, Weibo and Yang, Yong
- Published
- 2024
- Full Text
- View/download PDF
39. Effectiveness evaluation of fine water mist venturi nozzle systems with composite additives in improving fire suppression in polyurethane fires
- Author
-
Du, Chen-Yang, Yang, Yong, Zhai, Juan, Yang, Xin-Zhi, Tang, Yan, Dong, Xi-Lin, Liu, Yuan-Jun, and Huang, An-Chi
- Published
- 2024
- Full Text
- View/download PDF
40. Raloxifene Prevents Chemically-Induced Ferroptotic Neuronal Death In Vitro and In Vivo
- Author
-
Hao, Xiangyu, Wang, Yifan, Hou, Ming-Jie, Liao, Lixi, Yang, Yong Xiao, Wang, Ying-Hua, and Zhu, Bao Ting
- Published
- 2024
- Full Text
- View/download PDF
41. Effect of solidification path and volume shrinkage on cracking susceptibility at different cooling rates
- Author
-
Wang, Wei-an, Yang, Yong-kun, Qiu, Guo-xing, Wang, Jian-li, Wang, Guo-hua, and Li, Xiao-ming
- Published
- 2024
- Full Text
- View/download PDF
42. Ketogenic Diets Alter the Gut Microbiome, Resulting in Decreased Susceptibility to and Cognitive Impairment in Rats with Pilocarpine-Induced Status Epilepticus
- Author
-
Li, Bianli, Ma, Yue, Wang, Xuhui, Zhao, Di, Wang, Ziqin, Wang, Guoyang, Li, Chunyi, Yang, Lin, Ji, Hui, Liu, Kunmei, Chen, Qiuyuan, Yang, Yong, Ma, Wenqian, Du, Jianbin, Ma, Lei, Zhang, Lianxiang, and Qiang, Yuanyuan
- Published
- 2024
- Full Text
- View/download PDF
43. A dual-encoder network based on multi-layer feature fusion for infrared and visible image fusion
- Author
-
Huang, Shuying, Wu, Xueqiang, Yang, Yong, Wan, Weiguo, and Wang, Xiaozheng
- Published
- 2024
- Full Text
- View/download PDF
44. Texture, Mechanical Properties, and Formability of a Lightweight Steel during Cold Rolling and Annealing
- Author
-
Lin, Fang-min, Wu, Xue-jun, Zhang, Xiao-feng, Xing, Mei, Yang, Yong, and Wang, Yong-jian
- Published
- 2024
- Full Text
- View/download PDF
45. Optimizing dynamic degrees of freedom of solution-processed semiconducting polymers to form long-range order
- Author
-
Chiu, Yun-Hsuan, Huang, Ting-Yu, Lin, Kun-Ta, Wan, Keng-Cheng, Huang, Yu-Han, Yang, Yong-Ping, He, Cheng-Tai, Wei, Hsuan-Yen, Hsu, Tzu-Cheng, Su, Chun-Jen, Wang, Chen-An, Huang, Yu-Ching, Ruan, Jrjeng, Jeng, U.-Ser, and Hsu, Ben B. Y.
- Published
- 2024
- Full Text
- View/download PDF
46. Masked face recognition based on knowledge distillation and convolutional self-attention network
- Author
-
Wan, Weiguo, Wen, Runlin, Yao, Li, and Yang, Yong
- Published
- 2024
- Full Text
- View/download PDF
47. Direct CO2 Methylation to Value-Added Aromatics Through Tandem Catalysis
- Author
-
Yang, Yong, Li, Yukun, Qin, Qiong, Wang, Dongliang, Zhou, Huairong, and Zhang, Dongqiang
- Published
- 2024
- Full Text
- View/download PDF
48. Hollow tubular-structured molybdenum diselenide/carbon hybrid decorated by titanium dioxide nanoparticles for superior lithium-ion storage
- Author
-
Hu, Ren-Quan, Qin, Yi-Fan, Li, Jing-Xuan, Zhang, Peng, Zhao, Ning, Wang, Teng, Xu, Ya-Qi, Mu, Qing-Yang, and Yang, Yong
- Published
- 2024
- Full Text
- View/download PDF
49. Promotion and Mechanism of Acupotomy on Chondrocyte Autophagy in Knee Osteoarthritis Rabbits
- Author
-
Lu, Man, Meng, De-hong, She, Ze-yu, Wu, Xian, Xia, Shuai, Yang, Kai-ning, Liu, Cun-bin, Li, Tao, and Yang, Yong-hui
- Published
- 2024
- Full Text
- View/download PDF
50. Effects of particle size and oil-immersed concentration on the dust layer minimum ignition temperature and combustion characteristics of oil-immersed coal
- Author
-
Luo, Zhenmin, Yang, Yong, Ding, Xuhan, Luo, Chuanxu, Zhang, Fan, Zhang, Man, and Shu, Chi-Min
- Published
- 2024
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.